OWASP CONSUMER TOP TEN SAFE WEB HABITS

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Operating System Customization
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
MS System Setup Securing A System. Use Automatic Updates For a workstation or server, schedule the updates to occur regularly. –Control panel click on.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Staying Safe Online Keep your Information Secure.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Troubleshooting Windows Vista Security Chapter 4.
Internet of Things Top Ten. Agenda -Introduction -Misconception -Considerations -The OWASP Internet of Things Top 10 Project -The Top 10 Walkthrough.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Protecting Students on the School Computer Network Enfield High School.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Consumer Protection Shop Safely and Guard Your Financial Information.
Internet Security and Your Computer Welcome to Boot Camp.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
What is Spam? d min.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Windows Vista Configuration MCTS : Internet Explorer 7.0.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Internet Safety.
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
ArcGIS for Server Security: Advanced
What they are and how to protect against them
DATA SECURITY FOR MEDICAL RESEARCH
TECHNOLOGY GUIDE THREE
I S P S loss Prevention.
Home Computer Security
Information Security 101 Richard Davis, Rob Laltrello.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security of a Local Area Network
Welcome To : Group 1 VC Presentation
Information Security Awareness 101
Information Technology Services Education and Awareness Team
Unit 27: Network Operating Systems
IoO Student Computer Facilities Bath Street Campus
Digital $$ Quiz Test your knowledge.
Local Administrator Rights
Lesson 16-Windows NT Security Issues
Protecting Your Information Assets
Part 3.
Information Security Awareness
Chapter 3: Protecting Your Data and Privacy
Connecting Remotely Winter 2014.
9 ways to avoid viruses and spyware
Bethesda Cybersecurity Club
Designing IIS Security (IIS – Internet Information Service)
Online Safety Evening 2019.
Presentation transcript:

OWASP CONSUMER TOP TEN SAFE WEB HABITS SAFE PRACTICES FOR CONSUMERS ON THE WEB

INTRODUCTION Today, more and more of our personal lives is spent connected to the Internet. We spend a significant amount of time checking email, looking at social media, logging into our financial accounts, shopping, and more.

01 PROTECT YOUR SECRETS

Recommendations: CONSUMERS SHOULD FOCUS ON: TECH SAVVY USERS SHOULD ALSO: Use different passwords for each site Use long passwords not based on a dictionary word Don’t share your password Use a password manager Enable 2 factor authentication Select fake and/or random answers for security questions

02 GUARD YOUR PRIVACY

Recommendations: CONSUMERS SHOULD FOCUS ON: TECH SAVVY USERS SHOULD ALSO: Limit information shared on social media, including online “quizzes”, location, vacation plans, etc. Use HTTPS; check your browser’s address bar for the secure icon Check your privacy settings on all social media and mobile apps Delete/shred information which is no longer needed Encrypt important information Use Internet search engines which do not collect/retain search information for sensitive searches Encrypt all your communications when browsing by using a VPN or browsers that have built-in proxy or VPN feature.

USE SECURITY SOFTWARE AND SERVICES 03 USE SECURITY SOFTWARE AND SERVICES

Recommendations: CONSUMERS SHOULD FOCUS ON: TECH SAVVY USERS SHOULD ALSO: Enable the firewall on your personal computer and WiFi/Router Install anti-virus software and IDS and regularly scan your computer Use VPN Use browser's plugins which enforce security Use encrypted emails and messaging services

SECURE YOUR ENVIRONMENT 04 SECURE YOUR ENVIRONMENT

Recommendations: CONSUMERS SHOULD FOCUS ON: TECH SAVVY USERS SHOULD ALSO: Change all default passwords Disable guest accounts Set your devices to ask before connecting to WiFi networks and remove networks no longer being used Configure your home devices (WiFi access points, Routers, TVs, etc.) to be secure (i.e., change default passwords, update firmware, rename routers and SSID’s, turn off uPnP, etc.) Configure your system to only use Whitelisted applications Don’t use administrator or system accounts for routine tasks/work

PERFORM ROUTINE MAINTENANCE 05 PERFORM ROUTINE MAINTENANCE

Recommendations: CONSUMERS SHOULD FOCUS ON: TECH SAVVY USERS SHOULD ALSO: Use current version of software and enable auto-updates where possible Regularly patch your systems – Computers, phones, routers, WiFi, etc. Use modern browsers Uninstall unsafe software, including Java, Shockwave, Flash Uninstall software you don’t use Regularly run external port scans to check for unused services

06 THINK TWICE BEFORE TRUSTING

Recommendations: CONSUMERS SHOULD FOCUS ON: TECH SAVVY USERS SHOULD ALSO: Password protect your systems, devices, accounts, etc. Question emails, even from friends and family and do not click on links from unknown users If something doesn’t seem right, ask the source directly or do some research (via Google or some other means) before taking any action Don’t leave your systems unattended, use lockout screens Use software from official web sites and app stores, do not give applications excessive permissions Verify downloads against checksums

07 PLAN FOR THE WORST

Recommendations: CONSUMERS SHOULD FOCUS ON: TECH SAVVY USERS SHOULD ALSO: Backup important data, including passwords and encryption keys, and store in a safe place, offsite Configure your devices to be secure, for example to use disk encryption, in the event they are stolen or lost Use surge protectors Use online services and storage to backup data. Encrypt sensitive data Print off account recovery sheets (i.e. Google 10 passwords) and store offsite at a friend's place or at the bank Have backup Internet access

08 CLEANUP YOUR DEVICES AND ACCOUNTS

Recommendations: CONSUMERS SHOULD FOCUS ON: TECH SAVVY USERS SHOULD ALSO: Logout of accounts when you are done using them Periodically review and delete online accounts no longer needed or used Delete files no longer needed, including temporary files, text messages and chat logs, email (don’t forget sent mail), recycle bins, and old SSH keys Periodically review and delete system accounts no longer needed or used Periodically clean your browser cache Properly clean and sanitize computer equipment before discarding

AVOID UNNECESSARY RISKS 09 AVOID UNNECESSARY RISKS

Recommendations: CONSUMERS SHOULD FOCUS ON: TECH SAVVY USERS SHOULD ALSO: Avoid malicious/underground websites Avoid creating accounts for “shady” and sites you do not use regularly Do not do important tasks (pay bills, trade stocks, etc) on unprotected networks Use non-persistent virtual machines for riskier sites When creating DNS domains, use a privacy service to hide your home address if you have an unlisted telephone number Understand the risks of unsigned and side-loaded applications. Do not use them on your primary phone or system

BE VIGILANT AND ON ALERT 10 BE VIGILANT AND ON ALERT

Recommendations: CONSUMERS SHOULD FOCUS ON: TECH SAVVY USERS SHOULD ALSO: Think through online/digital activities and compare them to what you would do in the “real world” Use account monitoring services Review online account activity Beware of tech-support scammers Be savvy on client-side and social engineering attacks Use credit monitoring and freeze, and similar services to protect your credit

SUMMARY